Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
January 15, 2018
Search
Highlight

From neuron to cognition via computational neuroscience
An old aphorism says that, if our brains were simple enough to be understood, we wouldn’t be smart enough to understand them. Fortunately, many scientists are not so pessimistic, and they are unrelentingly trying to decipher it. As 3D bodies, we find it much easier to comprehend... more
Quote
David, the future king of Israel, stole from the Philistines the coveted art of iron-making, turned ploughshares into swords, and conquered all his enemies... more
- Miron Rezun (1996)
Articles
A complexity trichotomy for approximately counting list H-colorings: ACM Transactions on Computation Theory

H-colorings are essential in the exploration of language syntax expositions. An H-coloring is the allocation of adjacent colors to neighboring vertices of a... more

Complexity Measures & Classes (F.1.3) | Jan 11 18

Markov chains and Markov decision processes in Isabelle/HOL: Journal of Automated Reasoning

The intermingling of rather different domains can, at times, produce rather interesting results. Here the author explores the intersection of probability theory (in the guise of Markov chains... more

Markov Processes (G.3...) | Jan 11 18

Data science: a comprehensive overview: ACM Computing Surveys

This paper brings together a cohesive picture of data science, a new interdisciplinary academic field, from many different perspectives. In this 42-page paper, the author first reviews the evolution of data science... more

Introductory & Survey (A.1) | Jan 11 18

Dynamics at the boundary of game theory and distributed computing: ACM Transactions on Economics and Computation

The combination of scientific maturity, knowledge, and intelligence can sometimes be the reason and origin of the creation of a worthy artifact. Some... more

Games (I.2.1...) | Jan 10 18

Designing a semantic model for a wide-spectrum language with concurrency: Formal Aspects of Computing

A concurrent wide-spectrum language combines a concurrent programming language with specification constructs. Colvin et al. provide a unified... more

Concurrency (D.4.1...) | Jan 10 18

Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city: Personal and Ubiquitous Computing

The “smart city” will provide numerous services via broadcasted encrypted data, such as a pin or key for paid users to access... more

Data Encryption (E.3) | Jan 10 18

Robust adaptive neural network-based trajectory tracking control approach for nonholonomic electrically driven mobile robots: Robotics and Autonomous Systems

This is not your casual weekend read. We are hearing over and over this year that artificial intelligence (AI) is finally “taking over the world.” Maybe or maybe... more

Autonomous Vehicles (I.2.9...) | Jan 10 18

Detecting and resolving deadlocks in mobile agent systems: Journal of Visual Languages and Computing

A mobile agent is a software abstraction that moves across a computer network performing various tasks for end users. For example, on a cellular network... more

Multiagent Systems (I.2.11...) | Jan 10 18

X3ML mapping framework for information integration in cultural heritage and beyond: International Journal on Digital Libraries

A fascinating aspect of computer science is its variety of application domains. Sometimes the solution to a problem involving one application domain can be extended to a wide variety of domains. (A... more

Data Mapping (D.2.12...) | Jan 10 18

Security for the robot operating system: Robotics and Autonomous Systems

This paper is one of the few reported studies on the security of robotic operating systems. As such, it has clear value to make robotic system designers and users aware of the... more

Robotics (I.2.9) | Jan 8 18

Books
Nature-inspired computing: physics and chemistry-based algorithms

In recent years, a great deal of research interest has grown in nature-inspired computing, that is, computing involving the fundamental concepts of physics, chemistry, and biology. The discipline is now quite mature and... more
Nonnumerical Algorithms & Problems (F.2.2) | Jan 15 18

Programming Kotlin

It has been said that Java’s greatest contribution is the Java virtual machine (JVM). This is borne out by the proliferation of other JVM languages. While Java is (understandably) slow to change, other JVM languages have experimented with many new syntactic... more
Language Constructs & Features (D.3.3) | Jan 15 18

The legal technology guidebook

Lawyers--the older generation at least--are notoriously technologically illiterate and fearful that placing information in some digital format will waive attorney-client privilege. All of the authors have... more
General (K.5.0) | Jan 12 18

Advanced persistent security

The idea is simple (you just have to accept it): any cybersecurity defense that you may build to protect your organization will (eventually) fail. Period. The optimal way to proceed beyond that simple fact is to anticipate it by design, and build a security approach that... more
Security & Protection (K.6.5) | Jan 12 18

Python, PyGame and Raspberry Pi game development

The Raspberry Pi is a tiny, affordable computer ideally suited for the hobbyist. One of the uses of Raspberry Pi is as a game machine. Its operating system is an adaptation of the Debian Linux operating system... more
Games (K.8.0...) | Jan 11 18

Basic graph theory

Graph theory is a branch of discrete mathematics that has numerous theoretical and practical applications in a wide variety of areas. In this book, the author presents the fundamental concepts and terminology of graph theory in a simple, straightforward, and effective... more
Graph Theory (G.2.2) | Jan 9 18

Perl 6 fundamentals

We have been hearing about Perl 6 for some 15 years, but I have yet to meet anyone who actually uses it. The author observes that Perl 6 differs significantly from Perl 5, but he believes that it offers advantages in regular expression operations and Unicode support that... more
General (D.1.0) | Jan 5 18

Phrase mining from massive text and its applications

The extraction of what the authors call “quality phrases” from text is the topic of discussion in this monograph. To get an idea of what is meant by “quality” for a phrase, consider the three-word phrase “relational... more
Data Mining (H.2.8...) | Jan 4 18

Cybersecurity for industry 4.0: analysis for design and manufacturing

Industry 4.0 is a term that describes what is often called the fourth industrial revolution. The first three were mechanization, mass production, and computers and automation. The fourth is the cyber-physical... more
Security & Protection (K.6.5) | Jan 4 18

Spatial network big databases: queries and storage methods

Spatial network big data (SNBD) can be widely found in every corner of modern society. Examples include temporally detailed road maps that provide car speeds every minute for every road segment and GPS trace data from our cell phones. SNBD features the... more
Spatial Databases & GIS (H.2.8...) | Jan 4 18


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy